CN110457914A - Verification of data method, apparatus, computer equipment and storage medium - Google Patents
Verification of data method, apparatus, computer equipment and storage medium Download PDFInfo
- Publication number
- CN110457914A CN110457914A CN201910614639.1A CN201910614639A CN110457914A CN 110457914 A CN110457914 A CN 110457914A CN 201910614639 A CN201910614639 A CN 201910614639A CN 110457914 A CN110457914 A CN 110457914A
- Authority
- CN
- China
- Prior art keywords
- data
- business
- block chain
- node
- record
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2458—Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
- G06F16/2471—Distributed queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
Abstract
This application involves technical field of data processing, in particular to a kind of verification of data method, apparatus, computer equipment and storage medium.The described method includes: carrying out data encryption when receiving the Added Business data that other block chain nodes are sent in block chain network to the Added Business data and encrypted Added Business data being uploaded in the node account book of the current block chain node;When reaching the default verification time, by the node account book of block chain nodes all in block chain network, the business datum updated in prefixed time interval carries out the Data Matching of non-decrypted state between each other;When the business datum for determining the update mutually matches in all node account books, then the business datum verification of the update is passed through.Synchrodata verification safety is capable of providing using this method.
Description
Technical field
This application involves field of computer technology, more particularly to a kind of data check method, apparatus, computer equipment and
Storage medium.
Background technique
Operation system can all have daily generates the business datum that largely updates, due to business datum generation be distributed compared with
Extensively, a large amount of business datum may need to carry out distribution storage, therefore often be carried out by the way of establishing multiple data centers
Data storage, and the business datum for being distributed in various regions needs to carry out data and synchronizes.
During data are synchronous, the problem of often causing failure of data synchronization because of network or other unknown causes, cause
Information it is inconsistent, therefore, it is necessary to the data to various regions to check, and in business datum include many sensitive informations, in core
Pair process in have very big probability that can expose these sensitive informations, therefore, it is impossible to which business datum in audit process is completely secured
Safety.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of number that can be improved synchrodata verification safety
According to checking method, device, computer equipment and storage medium.
A kind of verification of data method, which comprises
When receiving the Added Business data that other block chain nodes are sent in block chain network, to the Added Business
Data carry out data encryption;
Encrypted Added Business data are uploaded in the node account book of the current block chain node;
When reaching the default verification time, by the node account book of block chain nodes all in block chain network, when presetting
Between be spaced in the business datum that updates carry out the Data Matching of non-decrypted state between each other;
When the business datum for determining the update mutually matches in all node account books, then to the update
Business datum verification passes through.
Method in one of the embodiments, further include:
Receive the processing business and updates data that service terminal is sent;
The processing business and updates data are uploaded in the corresponding database of the current block chain node and node account book;
The processing business and updates data are synchronized to the number of other block chain nodes in the block chain network by the database
According in library.
It is described in one of the embodiments, that data encryption is carried out to the Added Business data, comprising:
Read Added Business record one by one from the Added Business data;
Service identification is extracted from each Added Business record;
Search the corresponding sensitive field of the service identification and the corresponding encryption rule of the sensitive field;
Data encryption is carried out to the corresponding sensitive field according to the encryption rule.
It is described by the node account book of block chain nodes all in block chain network in one of the embodiments, it presets
The business datum updated in time interval carries out the Data Matching of non-decrypted state between each other, comprising:
The serial number of each business record in the business datum of the update of current node account book is read one by one;
Judge to whether there is and the consistent business record of the serial number in other node account books;
When there is business record consistent with the serial number in all node account books, by institute in all node account books
It states corresponding unencryption field in business record and carries out matching verification, encrypted fields corresponding in the business record are carried out zero
Knowledge proof verification;
When all unencryption fields match and all encrypted fields are verified by zero-knowledge proof, then described in judgement
Business record verification passes through.
It is described by the node account book of block chain nodes all in block chain network in one of the embodiments, it presets
The business datum updated in time interval carries out the Data Matching of non-decrypted state between each other, comprising:
The serial number of each business record in the business datum of the update of current node account book is read one by one;
Judge to whether there is and the consistent business record of the serial number in other node account books;
When there is business record consistent with the serial number in all node account books, by institute in all node account books
It states corresponding unencryption field in business record and carries out matching verification, encrypted fields corresponding in the business record are carried out zero
Knowledge proof verification;
When all unencryption fields match and all encrypted fields are verified by zero-knowledge proof, then described in judgement
Business record verification passes through.
Method in one of the embodiments, further include:
When determining in the presence of unsanctioned encrypted fields or unencryption field is verified, then the business record verification is determined
Failure;
Number is generated according to the serial number of the business record and the unsanctioned encrypted fields of the verification or unencryption field
According to exception reporting;
Data exception report is recorded in the node account book of each block chain node.
Method in one of the embodiments, further include:
When there are the node account book of the business record of no serial number, the corresponding business note of the serial number is obtained
Record the earliest record time in the block chain network;
Current time is obtained, intra-record slack byte duration is obtained according to current time and the earliest record time, and will be described
Intra-record slack byte duration and preset interval threshold value comparison;
When the intra-record slack byte duration is more than the preset interval threshold value, then the corresponding business note of the serial number is determined
It fails to match for record.
A kind of verification of data device, described device include:
Data encryption module, for when the Added Business data for receiving other block chain nodes transmission in block chain network
When, data encryption is carried out to the Added Business data;
Data cochain module, for encrypted Added Business data to be uploaded to the node of the current block chain node
In account book;
Data match module is used for when reaching the default verification time, by block chain nodes all in block chain network
In node account book, the business datum updated in prefixed time interval carries out the Data Matching of non-decrypted state between each other;
Determination module is verified, for mutually matching in all node account books when the business datum for determining the update
When, then the business datum verification of the update is passed through.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing
The step of device realizes the above method when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
The step of above method is realized when row.
Above-mentioned verification of data method, apparatus, computer equipment and storage medium, the business datum of update is uploaded in time
In the node account book of block chain network, when reaching the default verification time, by the business datum of the update in prefixed time interval
Carry out automatic checking.When carrying out Data Matching, it is not necessary that the field encrypted is decrypted, but directly to encrypted fields into
Row Data Matching improves the safety of data check to guarantee not expose the sensitive information in business datum.In addition,
The features such as high-transmission efficiency distinctive due to block chain itself, verification of data is carried out between block chain account book can be improved reconciliation
Frequency and efficiency reduce abnormal data and check cost, and can guarantee the safety and stability of storing data on account book.
Detailed description of the invention
Fig. 1 is the application scenario diagram of verification of data method in one embodiment;
Fig. 2 is the flow diagram of verification of data method in one embodiment;
Fig. 3 is the flow diagram of data synchronizing step in one embodiment;
Fig. 4 is the structural block diagram of verification of data device in one embodiment;
Fig. 5 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
Verification of data method provided by the present application, can be applied in application environment as shown in Figure 1.Wherein, each block
The node server 102 of chain node is communicated by network between each other, and building forms block chain network.In addition, each node
Server 102 can be communicated with service terminal 104 by network.Service terminal 104 can be sent to node server 102
The business datum of received update is uploaded to the database of this block chain link point by the business datum of update, node server 102
And in node account book, sent out when the node server 102 of some node receives other block chain nodes in block chain network
When the Added Business data sent, data encryption is carried out to Added Business data;Encrypted Added Business data are uploaded to and are worked as
In the node account book of preceding block chain link point;When reaching the default verification time, by block chain nodes all in block chain network
In node account book, the business datum updated in prefixed time interval carries out the Data Matching of non-decrypted state between each other;When sentencing
When making the business datum of update and mutually being matched in all node account books, then the business datum verification of update is passed through.
Wherein, service terminal 104 can be, but not limited to be various personal computers, laptop, smart phone, plate
Computer and portable wearable device, node server 102 can use the either multiple server compositions of independent server
Server cluster is realized.
In one embodiment, as shown in Fig. 2, providing a kind of verification of data method, it is applied in Fig. 1 in this way
It is illustrated for node server, comprising the following steps:
Step 210, when receiving the Added Business data that other block chain nodes are sent in block chain network, to newly-increased
Business datum carries out data encryption.
Operation system is provided with multiple data centers, and each data center is a block chain link in block chain network
Point.Each data center is each equipped with node server and node database, is carried out between multiple node servers by network
Communication forms block chain network to building, and node database can be the database in node server, or independent
Database, can also be communicated by network between multiple node databases, the data carried out between database are synchronous.
When the node server of a certain block chain node detects the database of other block chain nodes, to present node
When the Added Business data that database synchronization updates, the Added Business data of update are extracted from the database of present node.
Added Business data are the data generated during business carries out, such as user's registration information data, service order data.Work as section
When point server obtains Added Business data from database, node server can be according in database when the storage of data
Between, the Added Business data of update are actively grabbed from database, node server can also send more new data to database
Uploading instructions, so that database root uploads the Added Business data updated according to more new data uploading instructions to node server.
Node server extracts business information from Added Business data, and searches business number corresponding with business information
According to predetermined encryption rule, according to the predetermined encryption rule got to Added Business data carry out data encryption.Different business
Business datum in include field quantity, content it is different, each business can provide predetermined encryption rule, including need
The field and corresponding encryption rule, predetermined encryption rule for carrying out sensitive information shielding are stored in service terminal and each node clothes
It is engaged in device.
Step 220, encrypted Added Business data are uploaded in the node account book of current block chain node.
Encrypted Added Business data are uploaded in the node account book of current block chain node by node server, node
Account book carries out book keeping operation processing to encrypted Added Business data.Node account book is remembered to encrypted Added Business data
When account, the uplink time of Added Business data is recorded,
Step 230, when reaching the default verification time, by the node account book of block chain nodes all in block chain network
In, the business datum updated in prefixed time interval carries out the Data Matching of non-decrypted state between each other.
Each block chain link point in block chain network is according to the preset verification time cycle to the newly-increased number in node account book
According to progress verification of data.The default verification period be it is for statistical analysis to the data update cycle of history, calculate data update
The statistics index in period, is set according to statistics index.For example, can for institute's statistical updating period mean value, in
Place value etc..For example, can be 5 minutes by default verification cycle set, 10 minutes, half an hour etc..Node server is only to this
Incremental data in time cycle is checked, and without secondary reconciliation, so as to avoid repeating reconciliation, and improves reconciliation effect
Rate.
Initial is set in block chain network to check the time, and the time checked according to initial and the default verification period calculate it is pre-
If checking the time, the default verification time of each node server is consistent in block chain network.When reaching default verification
Between when, the Data Matching work of more new data in each automatic starter node account book of node server.The verification time is preset when reaching
When, each node server from corresponding node account book read prefixed time interval in newly-increased data, prefixed time interval
Time span is equal to the default verification period, and the newly-increased data read in the newly-increased data read out and other node account books are mutual
Between matched two-by-two.
When carrying out Data Matching, center service can be set by any one node server in block chain network
Device, central server are communicated with other node servers, other node servers send out the business datum of the update of reading
Send the business datum two for the update read to central server, central server by the business datum of the update received and locally
Data Matching is carried out between two.In other embodiments, central server can not also be set, is distinguished by each node server
The business datum updated is sent to other node servers, carries out Data Matching between each other.
Node server is when carrying out Data Matching between each other to the business datum of update, in the business datum of update
The Data Matching rule of non-encrypted data can be set as then matching when data are completely the same, also can be set as working as data symbols
Then it is judged to matching when closing preset numberical range, can also be set as certain when meeting between two data verified mutually
Data relationship then can determine that match, and can also set other matching rules.For the encryption number in the business datum of update
According to it is not necessary that encryption data is decrypted, using the verification rule between preset encryption data to encryption data progress data
Matching.If in business datum including multiple fields, the matching rule of different field can be different.
Step 240, when the business datum for determining update mutually matches in all node account books, then to update
Business datum verification passes through.
Meet matching when the business datum that node server determines update compares two-by-two in all node account books
Rule when being mutually matched, then determines that the Added Business verification of data updated in this prefixed time interval passes through.As long as there is one
When the Added Business data of Added Business data and other node account books in node account book mismatch, then determine to Added Business
Verification of data failure.
In above-mentioned verification of data method, the business datum of update is uploaded in time in the node account book of block chain network,
When reaching the default verification time, the business datum of the update in prefixed time interval is subjected to automatic checking.Carrying out data
When matching, it is not necessary that the field encrypted is decrypted, but Data Matching directly is carried out to encrypted fields, to guarantee
The sensitive information in business datum is not exposed, improves the safety of data check.Further, since the distinctive high biography of block chain itself
The features such as defeated efficiency, verification of data is carried out between block chain account book can be improved the frequency and efficiency of reconciliation, reduce abnormal data
Cost is checked, and can guarantee the safety and stability of storing data on account book.
In one embodiment, as shown in figure 3, the above method can also include following data synchronizing step:
Step 202, the processing business and updates data that service terminal is sent are received.
Service terminal all can be collected into or generate daily largely newly-increased processing business and updates data, and processing business and updates data can be with
Including but not limited to user's registration information, business change information etc..Processing business and updates data can be made of a plurality of business record, often
Business record is the business information of a update, may include multiple fields in every business record, such as user identifier, user
Multiple fields such as name, name, age, occupation.Processing business and updates data are uploaded to the number to match with itself by service terminal timing
According to center, i.e. node server.
Wherein, the matching rule of service terminal and data center can be equipment distance priority principle, i.e. service terminal will
Processing business and updates data are sent to the node server nearest with self geographical position;Scope of business matching principle can also be used,
The data of i.e. different data center's storage different business ranges, service terminal are sent according to the scope of business of processing business and updates data
To corresponding node server;In addition to this, the matching rule combined can also be matched with the scope of business using distance priority,
Or other matching rules.
Step 204, processing business and updates data are uploaded in the corresponding database of current block chain node and node account book.
After node server receives the processing business and updates data of service terminal upload, processing business and updates data are stored to working as
In the database of preceding block chain link point, thus locally carrying out data backup.Preferably, database according to the business received more
The time of new data is ranked up the data of storage.Database can be the database inside node server, or
The database of absolute version.Meanwhile received processing business and updates data are uploaded to the section of current block chain node by node server
Point account book in carry out data book keeping operation, before processing business and updates data being uploaded on block chain node account book, node server from
Business information is extracted in processing business and updates data, and searches the predetermined encryption rule of business datum corresponding with business information, root
Data encryption is carried out to processing business and updates data according to the predetermined encryption rule got, it will be in the processing business and updates data after encryption
It reaches in node account book.
Step 206, processing business and updates data are synchronized to the database of other block chain nodes in block chain network by database
In.
The database of present node is synchronized to block chain after processing business and updates data are locally stored, by processing business and updates data
In network in the database of other block chain nodes.Specifically, the database between each block chain network is led to by network
Letter, each database are that processing business and updates data are synchronized to by distributed data base using the method for data synchronization of distributed data base
The database of all block chain nodes, then respective node server is given by each database transmissions.So as to guarantee business more
New data is quickly synchronized to each data center in block chain network, and each block chain link point carries out synchrodata book keeping operation.
In one embodiment, data encryption is carried out to the Added Business data, comprising: from the Added Business data
In read one by one Added Business record;Service identification is extracted from each Added Business record;Search the service identification
Corresponding sensitivity field and the corresponding encryption rule of the sensitive field;According to the encryption rule to the corresponding sensitivity
Field carries out data encryption.
Since the service logic of different business is different, need hiding sensitive data also different in business datum.Each business
The encryption rule of the sensitive field for needing to carry out data encryption and each sensitive field can be previously set, by sensitive field and phase
The encryption rule and service identification associated storage answered are in service terminal and each node server.
Added Business data are made of a plurality of Added Business record, and every Added Business record may include multiple industry again
Business information field, wherein including service identification field.Node server reads Added Business note one by one from Added Business data
Record, and service identification is extracted from each Added Business record, node server searches the corresponding sensitive field of service identification
And the corresponding encryption rule of each sensitive field.Node server carries out at encryption it according to the encryption rule of each sensitive field
Reason.
The data mode of each sensitivity field is different, and therefore, the verification rule when verifying to each sensitive field also has
Institute's difference, as some need is verified, whether the encrypted fields in two account books are equal, and some need carries out numberical range comparison, have
Carry out add and subtract, multiply again relationship than equity.Different proof rules corresponds to different non-decryption and verifies equation, wherein
Sensitive field is equivalent to the input of non-decryption verification equation, and encryption rule is equivalent to the operation function of non-decryption verification equation.Cause
This, the encryption rule of each encrypted fields will also be adapted to the data mode of non-decryption verification equation, so that encrypted data are full
The data format requirement of sufficient equation.
In one embodiment, by the node account book of block chain nodes all in block chain network, prefixed time interval
The business datum of interior update carries out the Data Matching of non-decrypted state between each other, comprising: reads current node account book one by one
Update business datum in each business record serial number;Judge in other node account books with the presence or absence of consistent with serial number
Business record;When there is business record consistent with serial number in all node account books, by business in all node account books
Corresponding unencryption field carries out matching verification in record, and encrypted fields corresponding in business record are carried out zero-knowledge proof school
It tests;When all unencryption fields match and all encrypted fields are verified by zero-knowledge proof, then business record is determined
Verification passes through.
Business datum is made of a plurality of business record, and every business record may include multiple business information fields again.
Node server assigns one unique flowing water of every business record when the business datum of update is uploaded to node account book
Number, serial number can generate at random, can also be generated in the record time of service terminal by sequence according to each business record.
When carrying out verification of data, node server reads the flowing water of each business record in the business datum of update one by one
Number, it inquires in the node account book of other block chain nodes with the presence or absence of the business record consistent with the serial number of reading.For example,
If the node server of present node is center server, the node server of remaining each node is by the business number of each self refresh
According to central server is sent to, central server searches whether exist from the business datum of the update of received each node one by one
With the consistent business record of serial number of reading.
When node server all inquires business record consistent with the serial number of reading in all node account books,
Node server carries out the step of being mutually matched the field in each business record again.Specifically, each business record
Data format passes through the standardization of service terminal, and therefore, the field for including in each business record is also fixed, word
The verification matching rule of section is also determining.The Data Matching rule of each field is previously stored in node server, for not
Encrypted fields, node server obtain the corresponding verification matching rule of each field, and according to verification matching rule by multiple nodes
The field value of corresponding unencryption field is verified two-by-two in account book.For encrypted fields, node server is demonstrate,proved using Zero Knowledge
Bright method of calibration is verified the field value of respective encrypted field in multiple node account books two-by-two, i.e., certifier is not to testing
In the case that card person provides any encryption rule information, the field values for the encrypted fields that verifier only provides according to certifier are
It can determine whether field matches.
In one embodiment, corresponding encrypted fields carry out zero-knowledge proof verification in business record, comprising: obtain each
The corresponding zero-knowledge proof equation of the encryption rule of encrypted fields;Encrypted fields corresponding in each business record are inputted zero two-by-two
In knowledge proof equation, judge whether zero-knowledge proof equation is true;When all zero-knowledge proof equatioies inputted two-by-two of judgement
When setting up, then determine to pass through the verification of encrypted fields zero-knowledge proof.
In the present embodiment, zero-knowledge proof verification is using STARKs (the transparent knowledge of extendible capacity is proved) zero-knowledge proof
Technology, the data structure of zero-knowledge proof equation such as following formula (1):
C(P(x1))=Z (x2)*D(x2) (1)
Wherein, x1For an encrypted fields field values before encrypting, x in node account book 12It is corresponding in node account book 2
Encrypted fields field values before encrypting, P () and D () respectively indicate the encrypted fields in node account book 1 and node account book 2
Encryption function is equivalent to the private key of the encryption of two account books.Z () is well known proof rule, is equivalent to the public affairs of each node account book
Key, public key can store in intelligent contract, and C () is constraint condition, and the more corresponding encryption rule of different encrypted fields can
Different constraint condition is arranged.Therefore, because the difference of encryption rule and constraint condition, different fields it is corresponding from it is different
Zero-knowledge proof equation.
Server extracts zero-knowledge proof equation from the encryption rule of each encrypted fields, and by each encrypted fields each
Encrypted fields numerical value in account book inputs in zero-knowledge proof equation two-by-two as input parameter, and zero after determining input parameter knows
Whether true know proving monotonicity, when calculating the establishment of zero-knowledge proof equation, then determines the field in two node account books
Values match then determines to the encrypted fields zero-knowledge proof school when the encrypted fields match in all node account books
It tests and passes through.Otherwise, the node account book invalid simply by the presence of zero-knowledge proof equation after input parameter, then determine to the encrypted word
Section verification failure.
In one embodiment, corresponding encrypted fields carry out zero-knowledge proof verification in business record, comprising: block chain
The corresponding server of node is by encrypted fields corresponding clear text field, the blind factor of encryption key and encrypted fields before encrypting
Cryptographic Hash be sent to two-level node, two-level node can pass through for the server for calculate the signature result, two-level node
Network is communicated with block chain network.Two-level node is calculated according to the cryptographic Hash of clear text field, the blind factor and encrypted fields
Signature result is uploaded to block chain network by signature result, and block chain network calculates public key according to ciphertext field, further according to public affairs
Key signs to the cryptographic Hash of encrypted fields, by the signature compared with the signature result that two-level node uploads carries out sign test, when
When sign test passes through, then corresponding encrypted fields are verified by zero-knowledge proof in business record, and otherwise, zero-knowledge proof verification is lost
It loses.
Specifically, when to verify two encrypted fields it is equal when, it is assumed that the two encrypted fields of A and B are all in cryptography
Perdesen Commitment format be described as follows using ECC elliptic curve: A=a*G+x1*H;B=b*G+x2*H;Its
In, A, B are ciphertext field, and a, b are clear text field, and x1, x2 are the blind factor, and H point is H=h*G, and h is private key, two-level node pair
The parameter of P256 curve is replaced, obtain one it is new using H point as the P256 curve S of basic point, calculated on two-level node:
Message=hash (string (A)+string (B));Meanwhile (x1-x2) is calculated, and with (x1-x2) for private key, it is right
Message signs, and obtains signed codevector sig, sends sig signed codevector in block chain network;Block chain network calculates C=
A-B obtains public key C;It calculates encrypted fields cryptographic Hash message=hash (string (A)+string (B)), with C pairs
Message signs, if signature passes through, illustrates that A and B are equal.Further, it establishes on the basis of homomorphic encryption algorithm
On, other than it can compare A and B, it is assumed that there are encryption data A1, the A2 of Perdesen Commitment format,
A3... and B1, B2, B3..., it is whether equal that (A1+A2+A3+...) and (B1+B2+B3+...) can be compared.
When to verify the size relation of two encrypted fields, message=hash (string is calculated on two-level node
(A)+string(B));It calculates y=(x1-x2) simultaneously, c=(a-b);With message, c, y are parameter, carry out RangeProof
It calculates, obtains signature result Sig, send sig signed codevector in block chain network.Node server meter in block chain network
It calculates message=hash (string (A)+string (B)), calculates simultaneously: C=(A-B);With message, C, Sig are parameter,
Carry out RangeProof sign test, if sign test passes through, the plaintext c for illustrating C be a range [0,2^32) integer;Into one
Step ground, it was demonstrated that certain number is under the jurisdiction of demand within the scope of one and very common, such as a≤n≤b, at this point it is possible to together
When (n-a) >=0&& (b-n) >=0 proof is provided, i.e., provable n is under the jurisdiction of between [a, b].
Further, node server can be according to the field that in the business record that it fails to match, it fails to match and this
The serial number of business record generates data exception report.Data exception can be reported and save to local or be recorded in node account book
In, consequently facilitating corresponding service terminal is checked the problem of carrying out data synchronous abnormality.
In one embodiment, verification of data method can be the following steps are included: when the business that there is not serial number
When the node account book of record, earliest record time of the corresponding business record of serial number in block chain network is obtained;Acquisition is worked as
The preceding time obtains intra-record slack byte duration according to current time and earliest record time, and by intra-record slack byte duration and preset interval
Threshold value comparison;When intra-record slack byte duration is more than preset interval threshold value, then determine that it fails to match for the corresponding business record of serial number.
When node server carries out business record inquiry according to serial number in each node account book, when node server is searched
When to node account book not with the consistent business record of the serial number of reading, node server obtains remaining, and there are the flowing water
Number business record node account book in, the record time of the business record, record the time be node account book to the record carry out
The time of book keeping operation.When node server finds out the earliest record to business record in block chain network from each record time
Between.
Node server obtains current time, calculates current time with the time difference of earliest record time to be remembered
Record interval duration.Node server obtains preset interval threshold value, and whether preset interval threshold value is super maximum synchronous for measuring record
Postpone duration, intra-record slack byte duration is compared with preset interval threshold value, determines when according to comparison result by node server
When intra-record slack byte duration is more than preset interval threshold value, node server determines that the corresponding business record matching of the serial number read is lost
Lose, the problems such as which may be due to network failure synchronization failure.
Further, the available node account book for lacking the corresponding business record of the serial number of node server is corresponding
Station code generates data exception report according to station code and serial number, data exception can be reported save to local or
It is recorded in node account book, consequently facilitating corresponding service terminal is checked the problem of carrying out data synchronous abnormality.
In one embodiment, the above method can be the following steps are included: between intra-record slack byte duration be less than and presets
When threshold value, the record time modification by the corresponding processing business and updates record of serial number in all node account books is current time.
When node server, which determines intra-record slack byte duration, is less than preset interval threshold value, then by remaining, there are the streams
In the node account book of the business record of water number, the record time modification of this business record is current time.To this business
Record no longer carries out the verification of data of field value, i.e., verification of data is no longer carried out within this verification period, this records may
It is not yet to be synchronized due to network delay etc., it cannot be merely due to the temporary missing of business record decides that the record
Synchronization failure.By the record time modification of this business record in remaining node account book be current time, can make its automatically into
Enter the verification of data in next verification period.
In the present embodiment, in the case where there is missing in node account book in business record, by setting preset interval
Threshold value, it can be ensured that all business records only carry out a reconciliation, avoid repeating reconciliation work.
In one embodiment, verification of data method can be the following steps are included: do not pass through when determining in the presence of verification
Encrypted fields or unencryption field when, then determine business record verification failure;According to the serial number of the business record,
And the unsanctioned encrypted fields of the verification or unencryption field generate data exception report;The data exception is reported and is recorded
In the node account book of each block chain node.
When each field in business record of the node server to update is matched two-by-two between all node account books
When, when detecting not pass through the encrypted fields or unencryption field of data check, then determine the business record core that this updates
To failure.
Node server obtains the business record of Data Matching failure, wherein being included in certain node account books, there are data
The business record and field value of missing mutually verify the business record of failure between each account book, and node server is according to number
Verification of data report is generated according to the business record that it fails to match.In verification of data report, for the business record of shortage of data,
Node server can directly list the business record that it fails to match;For the business record of field verification failure, node serve
Device also obtains the serial number of business record, and the encrypted fields and/or unencryption field of verification failure, and obtains the school of each field
Failure cause is tested, node server generates verification of data according to serial number and verification failure cause and reports;Other can also be used
Mode generates data exception report.
Node server record verification time, verification time in verification of data report are set as current time.Node clothes
The data exception report of generation is uploaded in the node account book of present node by business device, while being synchronized to the data of present node
Verification of data report is synchronized in the database of other nodes by database, then is uploaded to by the database of other nodes by library
The node server of other nodes is uploaded in corresponding node account book, thus by data by the node server of other nodes
Exception reporting is recorded in block chain network.
In one embodiment, the above method can be the following steps are included: receive the abnormal bill of service terminal transmission
Inquiry request carries query time range in abnormal bill inquiry request;It searches and is looked into the node account book of current block chain node
Ask the data exception report in time range;Data exception report is returned into service terminal.
Service terminal needs to verify whether the business datum uploaded keeps accounts success, and service terminal can be periodically to matching
Node server sends abnormal bill inquiry request, can also pass through operation service terminal from auditor actively to matched section
Point server sends abnormal bill inquiry request.Abnormal bill inquiry request user requests inquiry book keeping operation abnormal to node server
Business datum, the query time range for the business datum that carried terminal has uploaded in abnormal bill inquiry request.Node serve
Device receives the abnormal bill inquiry request that service terminal is sent, and query time range is extracted from abnormal bill inquiry request.
Node server is different from the data that the search record time is within the scope of query time in the node account book of current block chain node
Often report, and data exception report is returned into service terminal.
In the present embodiment, service terminal is when sending abnormal bill inquiry request to node server, can directly from
The abnormal data record within the scope of query time is got in the node account book of block chain node, so as to effectively shorten data
The time is checked, verification of data cost is reduced.
It should be understood that although each step in the flow chart of Fig. 2-3 is successively shown according to the instruction of arrow,
These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-3
Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively
It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately
It executes.
In one embodiment, as shown in figure 4, providing a kind of verification of data device, comprising: data encryption module 410,
Data uploading module 420, data match module 430 and verification determination module 440, in which:
Data encryption module 410, for when the Added Business for receiving other block chain nodes transmission in block chain network
When data, data encryption is carried out to the Added Business data.
Data uploading module 420, for encrypted Added Business data to be uploaded to the current block chain node
In node account book.
Data match module 430 is used for when reaching the default verification time, by block chain nodes all in block chain network
Node account book in, the business datum updated in prefixed time interval carries out the Data Matching of non-decrypted state between each other.
Determination module 440 is checked, for when determining the business datum of the update in all node account books mutually
When matching, then the business datum verification of the update is passed through.
In one embodiment, verification of data device can also include:
Data reception module is updated, for receiving the processing business and updates data of service terminal transmission.
More new data uploading module, for by processing business and updates data be uploaded to the corresponding database of current block chain node and
In node account book.
Processing business and updates data are synchronized to other block chain links in block chain network for database by database synchronization module
In the database of point.
In one embodiment, data encryption module 410 may include:
Reading unit is recorded, for reading Added Business record one by one from the Added Business data.
Marker extraction module, for extracting service identification from each Added Business record.
Encryption information searching unit, for searching the corresponding sensitive field of the service identification and the sensitive field pair
The encryption rule answered.
Cryptographic processing unit, for carrying out data encryption to the corresponding sensitive field according to the encryption rule.
In one embodiment, data match module 430 may include:
Serial number reading unit, each business in the business datum of the update for reading current node account book one by one
The serial number of record.
Consistent judging unit is remembered in other node account books with the presence or absence of with the consistent business of the serial number for judging
Record.
Field verification unit is used for when there is business record consistent with the serial number in all node account books,
Unencryption field corresponding in business record described in all node account books is subjected to matching verification, by phase in the business record
The encrypted fields answered carry out zero-knowledge proof verification.
Judging unit is verified, all unencryption fields match and all encrypted fields pass through zero-knowledge proof for working as
When verification, then determine that the business record verification passes through.
In one embodiment, field verification unit may include:
Equation obtains subelement, the corresponding zero-knowledge proof equation of encryption rule for obtaining each encrypted fields.
Equation determines subelement, for encrypted fields corresponding in each business record to be inputted the Zero Knowledge two-by-two
In proving monotonicity, judge whether the zero-knowledge proof equation is true.
Result judgement subelement, for when determining that all zero-knowledge proof equatioies inputted two-by-two are set up, then determining
Encrypted fields zero-knowledge proof verification is passed through.
In one embodiment, verification of data device can also include:
Failure determination module, for when determining in the presence of unsanctioned encrypted fields or unencryption field is verified, then sentencing
The fixed business record verification failure.
Report generation module, for according to the serial number of the business record and the unsanctioned encrypted fields of verification
Or unencryption field generates data exception report;
Logging modle is reported, for data exception report to be recorded in the node account book of each block chain node
In.
In one embodiment, verification of data device can also include:
Time-obtaining module, for when there are the node account book of the business record of no serial number, described in acquisition
Earliest record time of the corresponding business record of serial number in the block chain network.
Time length comparison module is recorded for obtaining current time according to current time and the earliest record time
It is spaced duration, and by the intra-record slack byte duration and preset interval threshold value comparison.
Failure determination module, described in when the intra-record slack byte duration is more than the preset interval threshold value, then determining
It fails to match for the corresponding business record of serial number.
Specific about verification of data device limits the restriction that may refer to above for verification of data method, herein not
It repeats again.Modules in above-mentioned verification of data device can be realized fully or partially through software, hardware and combinations thereof.On
Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form
In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction
Composition can be as shown in Figure 5.The computer equipment include by system bus connect processor, memory, network interface and
Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment
Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data
Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The database of machine equipment checks data for storing data.The network interface of the computer equipment is used to pass through with external terminal
Network connection communication.To realize a kind of verification of data method when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Fig. 5, only part relevant to application scheme is tied
The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment
It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with
Computer program, which, which performs the steps of to work as when executing computer program, receives other blocks in block chain network
When the Added Business data that chain node is sent, data encryption is carried out by encrypted Added Business number to the Added Business data
According to being uploaded in the node account book of the current block chain node;When reaching the default verification time, by institute in block chain network
In the node account book for having block chain node, the business datum updated in prefixed time interval carries out non-decrypted state between each other
Data Matching;When the business datum for determining the update mutually matches in all node account books, then to the update
Business datum verification pass through.
In one embodiment, it is also performed the steps of when processor executes computer program and receives service terminal transmission
Processing business and updates data;The processing business and updates data are uploaded to the corresponding database of the current block chain node and node account
In this;The processing business and updates data are synchronized to the database of other block chain nodes in the block chain network by the database
In.
In one embodiment, realize that carrying out data to the Added Business data adds when processor executes computer program
It is also used to when close step: reading the serial number of each business record in the second business datum of current node account book one by one;From
Added Business record is read in the Added Business data one by one;Service identification is extracted from each Added Business record;
Search the corresponding sensitive field of the service identification and the corresponding encryption rule of the sensitive field;According to the encryption rule
Data encryption is carried out to the corresponding sensitive field.
In one embodiment, it realizes when processor executes computer program by block chain nodes all in block chain network
Node account book in, the business datum updated in prefixed time interval carries out the step of the Data Matching of non-decrypted state between each other
It is also used to when rapid: reading the serial number of each business record in the business datum of the update of current node account book one by one;Sentence
Breaking whether there is in other node account books and the consistent business record of the serial number;When in all node account books exist and institute
When stating the consistent business record of serial number, unencryption field corresponding in business record described in all node account books is carried out
With verification, encrypted fields corresponding in the business record are subjected to zero-knowledge proof verification;When all unencryption fields equal
Match and when all encrypted fields are verified by zero-knowledge proof, then determines that business record verification passes through.
In one embodiment, it realizes when processor executes computer program by encrypted word corresponding in the business record
It is also used to when the step of Duan Jinhang zero-knowledge proof verification: obtaining the corresponding Zero Knowledge card of encryption rule of each encrypted fields
Bright equation;Encrypted fields corresponding in each business record are inputted two-by-two in the zero-knowledge proof equation, described in judgement
Whether zero-knowledge proof equation is true;When determining that all zero-knowledge proof equatioies inputted two-by-two are set up, then determine to institute
The verification of encrypted fields zero-knowledge proof is stated to pass through.
In one embodiment, it also performs the steps of to work as when processor executes computer program and determine in the presence of verification
When unsanctioned encrypted fields or unencryption field, then determine the business record verification failure according to the stream of the business record
Water number and the unsanctioned encrypted fields of the verification or unencryption field generate data exception report;By the data exception report
Announcement is recorded in the node account book of each block chain node.
In one embodiment, it is also performed the steps of when processor executes computer program when there are no streams
When the node account book of the business record of water number, the corresponding business record of the serial number is obtained in the block chain network most
The early record time;Current time is obtained, intra-record slack byte duration is obtained according to current time and the earliest record time, and by institute
State intra-record slack byte duration and preset interval threshold value comparison;When the intra-record slack byte duration is more than the preset interval threshold value, then
Determine that it fails to match for the corresponding business record of the serial number.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program performed the steps of when being executed by processor when receive other block chain nodes in block chain network send it is newly-increased
When business datum, to the Added Business data carry out data encryption encrypted Added Business data are uploaded to it is described current
In the node account book of block chain node;When reaching the default verification time, by the section of block chain nodes all in block chain network
In point account book, the business datum updated in prefixed time interval carries out the Data Matching of non-decrypted state between each other;Work as judgement
When the business datum of the update mutually matches in all node account books out, then the business datum of the update is checked logical
It crosses.
In one embodiment, it is also performed the steps of when computer program is executed by processor and receives service terminal hair
The processing business and updates data sent;Processing business and updates data are uploaded in the corresponding database of current block chain node and node account book;
Processing business and updates data are synchronized in block chain network in the database of other block chain nodes by database.
In one embodiment, it is realized when computer program is executed by processor and data is carried out to the Added Business data
It is also used to when the step of encryption: reading the serial number of each business record in the second business datum of current node account book one by one;
Read Added Business record one by one from the Added Business data;Business mark is extracted from each Added Business record
Know;Search the corresponding sensitive field of the service identification and the corresponding encryption rule of the sensitive field;It is advised according to the encryption
Data encryption then is carried out to the corresponding sensitive field.
In one embodiment, it realizes when computer program is executed by processor by block chain links all in block chain network
In the node account book of point, the business datum updated in prefixed time interval carries out the Data Matching of non-decrypted state between each other
It is also used to when step: reading the serial number of each business record in the business datum of the update of current node account book one by one;
Judge to whether there is and the consistent business record of the serial number in other node account books;When in all node account books exist with
When the consistent business record of the serial number, unencryption field corresponding in business record described in all node account books is carried out
Encrypted fields corresponding in the business record are carried out zero-knowledge proof verification by matching verification;When all unencryption fields are equal
Matching and when all encrypted fields are verified by zero-knowledge proof, then determine that business record verification passes through.
In one embodiment, realizing when computer program is executed by processor will encrypt accordingly in the business record
Field be also used to when the step of zero-knowledge proof verification: obtaining the corresponding Zero Knowledge of encryption rule of each encrypted fields
Proving monotonicity;Encrypted fields corresponding in each business record are inputted two-by-two in the zero-knowledge proof equation, judge institute
Whether true state zero-knowledge proof equation;When determining that all zero-knowledge proof equatioies inputted two-by-two are set up, then judgement pair
The encrypted fields zero-knowledge proof verification passes through.
In one embodiment, also perform the steps of that there are schools when determining when computer program is executed by processor
When testing unsanctioned encrypted fields or unencryption field, then determine the business record verification failure according to the business record
Serial number and the unsanctioned encrypted fields of the verification or unencryption field generate data exception report;By the data exception
Report is recorded in the node account book of each block chain node.
In one embodiment, it is also performed the steps of when computer program is executed by processor no described when existing
When the node account book of the business record of serial number, the corresponding business record of the serial number is obtained in the block chain network
The record time earliest;Current time is obtained, intra-record slack byte duration is obtained according to current time and the earliest record time, and will
The intra-record slack byte duration and preset interval threshold value comparison;When the intra-record slack byte duration is more than the preset interval threshold value,
Then determine that it fails to match for the corresponding business record of the serial number.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (10)
1. a kind of verification of data method, which comprises
When receiving the Added Business data that other block chain nodes are sent in block chain network, to the Added Business data
Carry out data encryption;
Encrypted Added Business data are uploaded in the node account book of the current block chain node;
When reaching the default verification time, by the node account book of block chain nodes all in block chain network, between preset time
The Data Matching of non-decrypted state is carried out between each other every the business datum of interior update;
When the business datum for determining the update mutually matches in all node account books, then to the business of the update
Verification of data passes through.
2. the method according to claim 1, wherein the method also includes:
Receive the processing business and updates data that service terminal is sent;
The processing business and updates data are uploaded in the corresponding database of the current block chain node and node account book;
The processing business and updates data are synchronized to the database of other block chain nodes in the block chain network by the database
In.
3. the method according to claim 1, wherein it is described to the Added Business data carry out data encryption,
Include:
Read Added Business record one by one from the Added Business data;
Service identification is extracted from each Added Business record;
Search the corresponding sensitive field of the service identification and the corresponding encryption rule of the sensitive field;
Data encryption is carried out to the corresponding sensitive field according to the encryption rule.
4. the method according to claim 1, wherein the section by block chain nodes all in block chain network
In point account book, the business datum updated in prefixed time interval carries out the Data Matching of non-decrypted state between each other, comprising:
The serial number of each business record in the business datum of the update of current node account book is read one by one;
Judge to whether there is and the consistent business record of the serial number in other node account books;
When there is business record consistent with the serial number in all node account books, by industry described in all node account books
Corresponding unencryption field carries out matching verification in business record, and encrypted fields corresponding in the business record are carried out Zero Knowledge
Prove verification;
When all unencryption fields match and all encrypted fields are verified by zero-knowledge proof, then the business is determined
Record verification passes through.
5. according to the method described in claim 4, it is characterized in that, it is described by encrypted fields corresponding in the business record into
The verification of row zero-knowledge proof, comprising:
Obtain the corresponding zero-knowledge proof equation of encryption rule of each encrypted fields;
Encrypted fields corresponding in each business record are inputted two-by-two in the zero-knowledge proof equation, judge that described zero knows
Whether true know proving monotonicity;
When determining that all zero-knowledge proof equatioies inputted two-by-two are set up, then determine to the encrypted fields zero-knowledge proof
Verification passes through.
6. according to the method described in claim 4, it is characterized in that, the method also includes:
When determining in the presence of unsanctioned encrypted fields or unencryption field is verified, then determine that the business record verification is lost
It loses;
It is different that data are generated according to the serial number of the business record and the unsanctioned encrypted fields of the verification or unencryption field
Often report;
Data exception report is recorded in the node account book of each block chain node.
7. according to the method described in claim 4, it is characterized in that, the method also includes:
When there are the node account book of the business record of no serial number, obtains the corresponding business record of the serial number and exist
The earliest record time in the block chain network;
Current time is obtained, intra-record slack byte duration is obtained according to current time and the earliest record time, and by the record
It is spaced duration and preset interval threshold value comparison;
When the intra-record slack byte duration is more than the preset interval threshold value, then the corresponding business record of the serial number is determined
With failure.
8. a kind of verification of data device, which is characterized in that described device includes:
Data encryption module, for when receiving the Added Business data that other block chain nodes in block chain network are sent,
Data encryption is carried out to the Added Business data;
Data cochain module, for encrypted Added Business data to be uploaded to the node account book of the current block chain node
In;
Data match module is used for when reaching the default verification time, by the node of block chain nodes all in block chain network
In account book, the business datum updated in prefixed time interval carries out the Data Matching of non-decrypted state between each other;
Determination module is verified, for when the business datum for determining the update mutually matches in all node account books,
Then the business datum verification of the update is passed through.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists
In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910614639.1A CN110457914A (en) | 2019-07-09 | 2019-07-09 | Verification of data method, apparatus, computer equipment and storage medium |
PCT/CN2019/121530 WO2021003968A1 (en) | 2019-07-09 | 2019-11-28 | Data checking method and apparatus, and computer device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910614639.1A CN110457914A (en) | 2019-07-09 | 2019-07-09 | Verification of data method, apparatus, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110457914A true CN110457914A (en) | 2019-11-15 |
Family
ID=68482415
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910614639.1A Pending CN110457914A (en) | 2019-07-09 | 2019-07-09 | Verification of data method, apparatus, computer equipment and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110457914A (en) |
WO (1) | WO2021003968A1 (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111262848A (en) * | 2020-01-13 | 2020-06-09 | 万春琦 | Access control system based on block chain account encryption |
CN111367933A (en) * | 2020-03-18 | 2020-07-03 | 北京意锐新创科技有限公司 | Bill security protection method and device suitable for payment equipment management and control platform |
CN111800252A (en) * | 2020-07-22 | 2020-10-20 | 深圳壹账通智能科技有限公司 | Information auditing method and device based on block chain and computer equipment |
CN112052265A (en) * | 2020-09-02 | 2020-12-08 | 平安壹钱包电子商务有限公司 | Data checking and confirming method and device, computer equipment and readable storage medium |
WO2021003968A1 (en) * | 2019-07-09 | 2021-01-14 | 深圳壹账通智能科技有限公司 | Data checking method and apparatus, and computer device and storage medium |
CN113190616A (en) * | 2021-04-16 | 2021-07-30 | 宁波市民卡运营管理有限公司 | Block chain reconciliation system and method, computer device and readable storage medium |
CN113285945A (en) * | 2021-05-19 | 2021-08-20 | 恒安嘉新(北京)科技股份公司 | Communication security monitoring method, device, equipment and storage medium |
CN113301115A (en) * | 2020-07-29 | 2021-08-24 | 钱秀英 | Information acquisition system for data transmission among communication devices |
CN113761064A (en) * | 2021-08-27 | 2021-12-07 | 成都质数斯达克科技有限公司 | Block chain based daily cutting account checking method, device, equipment and readable storage medium |
CN113849543A (en) * | 2021-09-30 | 2021-12-28 | 北京荷月科技有限公司 | Account checking information query system, data updating method and account checking query method |
CN115086065A (en) * | 2022-07-12 | 2022-09-20 | 北斗星通智联科技有限责任公司 | Data synchronization method and device based on block chain, electronic equipment and medium |
CN116109275A (en) * | 2023-02-23 | 2023-05-12 | 成都鱼泡科技有限公司 | Multi-data account checking method and system |
CN112052265B (en) * | 2020-09-02 | 2024-05-10 | 平安壹钱包电子商务有限公司 | Data verification method, device, computer equipment and readable storage medium |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112800040B (en) * | 2021-01-22 | 2024-02-06 | 平安养老保险股份有限公司 | Service data verification method, device, computer equipment and storage medium |
CN113256257A (en) * | 2021-05-28 | 2021-08-13 | 北京瑞卓喜投科技发展有限公司 | Transaction signing method and device based on block chain and electronic equipment |
CN113595240B (en) * | 2021-06-21 | 2024-01-19 | 深圳供电局有限公司 | Method, device, equipment and storage medium for detecting electric power data |
CN113377757B (en) * | 2021-06-24 | 2023-08-25 | 杭州数梦工场科技有限公司 | Data checking method and device, electronic equipment and machine-readable storage medium |
CN113450096A (en) * | 2021-06-25 | 2021-09-28 | 未鲲(上海)科技服务有限公司 | Resource transfer data processing method and device, electronic equipment and medium |
CN113642027B (en) * | 2021-09-01 | 2024-04-16 | 卫宁健康科技集团股份有限公司 | Medical information integration method, device, computer equipment, medium and system |
CN114785812B (en) * | 2022-06-22 | 2022-10-21 | 浙商银行股份有限公司 | Block chain block synchronization method and device based on zero knowledge proof |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11531974B2 (en) * | 2016-08-17 | 2022-12-20 | International Business Machines Corporation | Tracking transactions through a blockchain |
CN109345251A (en) * | 2018-08-24 | 2019-02-15 | 深圳壹账通智能科技有限公司 | Negotiable block chain method of commerce, device, equipment and storage medium |
CN109671205B (en) * | 2018-09-25 | 2022-04-15 | 深圳壹账通智能科技有限公司 | Voting method, device and equipment based on block chain and computer storage medium |
CN110457914A (en) * | 2019-07-09 | 2019-11-15 | 深圳壹账通智能科技有限公司 | Verification of data method, apparatus, computer equipment and storage medium |
-
2019
- 2019-07-09 CN CN201910614639.1A patent/CN110457914A/en active Pending
- 2019-11-28 WO PCT/CN2019/121530 patent/WO2021003968A1/en active Application Filing
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021003968A1 (en) * | 2019-07-09 | 2021-01-14 | 深圳壹账通智能科技有限公司 | Data checking method and apparatus, and computer device and storage medium |
CN111262848A (en) * | 2020-01-13 | 2020-06-09 | 万春琦 | Access control system based on block chain account encryption |
CN111367933A (en) * | 2020-03-18 | 2020-07-03 | 北京意锐新创科技有限公司 | Bill security protection method and device suitable for payment equipment management and control platform |
CN111800252A (en) * | 2020-07-22 | 2020-10-20 | 深圳壹账通智能科技有限公司 | Information auditing method and device based on block chain and computer equipment |
CN113301115A (en) * | 2020-07-29 | 2021-08-24 | 钱秀英 | Information acquisition system for data transmission among communication devices |
CN112052265B (en) * | 2020-09-02 | 2024-05-10 | 平安壹钱包电子商务有限公司 | Data verification method, device, computer equipment and readable storage medium |
CN112052265A (en) * | 2020-09-02 | 2020-12-08 | 平安壹钱包电子商务有限公司 | Data checking and confirming method and device, computer equipment and readable storage medium |
CN113190616A (en) * | 2021-04-16 | 2021-07-30 | 宁波市民卡运营管理有限公司 | Block chain reconciliation system and method, computer device and readable storage medium |
CN113285945A (en) * | 2021-05-19 | 2021-08-20 | 恒安嘉新(北京)科技股份公司 | Communication security monitoring method, device, equipment and storage medium |
CN113761064A (en) * | 2021-08-27 | 2021-12-07 | 成都质数斯达克科技有限公司 | Block chain based daily cutting account checking method, device, equipment and readable storage medium |
CN113849543A (en) * | 2021-09-30 | 2021-12-28 | 北京荷月科技有限公司 | Account checking information query system, data updating method and account checking query method |
CN113849543B (en) * | 2021-09-30 | 2022-07-12 | 北京荷月科技有限公司 | Account checking information query system, data updating method and account checking query method |
CN115086065A (en) * | 2022-07-12 | 2022-09-20 | 北斗星通智联科技有限责任公司 | Data synchronization method and device based on block chain, electronic equipment and medium |
CN115086065B (en) * | 2022-07-12 | 2024-01-19 | 北斗星通智联科技有限责任公司 | Block chain-based data synchronization method and device, electronic equipment and medium |
CN116109275A (en) * | 2023-02-23 | 2023-05-12 | 成都鱼泡科技有限公司 | Multi-data account checking method and system |
Also Published As
Publication number | Publication date |
---|---|
WO2021003968A1 (en) | 2021-01-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110457914A (en) | Verification of data method, apparatus, computer equipment and storage medium | |
CN110427424A (en) | Business datum checking method, device, computer equipment and storage medium | |
CN111382464B (en) | Encryption ASIC including circuit code conversion function | |
CN109409122B (en) | File storage method, electronic device and storage medium | |
CN106372533B (en) | Content storage method based on block chain technology | |
EP3693886A1 (en) | Optimizations for verification of interactions system and method | |
CN110175840B (en) | Method, client, alliance chain and system for realizing light wallet mechanism in alliance chain | |
CN110389985A (en) | Verification of data method, apparatus, computer equipment and storage medium | |
CN109327528A (en) | A kind of node administration method and device based on block chain | |
CN109474578A (en) | Message method of calibration, device, computer equipment and storage medium | |
CN112287034B (en) | Data synchronization method, equipment and computer readable storage medium | |
US11468044B2 (en) | Optimizations for verification of interactions system and method using probability density functions | |
CN114372296B (en) | Block chain-based user behavior data auditing method and system | |
CN109547488A (en) | A kind of trust data calculating and exchange system based on alliance's block chain | |
CN112287033B (en) | Data synchronization method, equipment and computer readable storage medium | |
CN110264354A (en) | It creates block chain account and verifies the method and device of block chain transaction | |
CN112527912A (en) | Data processing method and device based on block chain network and computer equipment | |
CN110190963A (en) | A kind of monitoring method, device and equipment for the request of time service certificates constructing | |
CN110689348B (en) | Revenue verification method, device, terminal and medium based on alliance chain | |
CN104394166A (en) | Certificate anti-fake authentication system and method for mobile terminal under cloud environment | |
CN113806816A (en) | Electronic file management method and device based on block chain and electronic equipment | |
CN111768180B (en) | Block chain account balance deposit certificate and recovery method | |
CN113609533A (en) | Integrity auditing method for smart power grid data | |
CN111444206B (en) | Synchronous processing method, device, equipment and medium | |
CN109101232A (en) | A kind of method, apparatus of product development, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |